CryptoDB
Rohit Sinha
Publications
Year
Venue
Title
2025
PKC
Split Prover Zero-Knowledge SNARKs
Abstract
We initiate the study of split prover zkSNARKs, which allow
Alice to offload part of the zkSNARK computation to her assistant, Bob.
In scenarios like online transactions (e.g., zCash), a significant portion
of the witness (e.g., membership proofs of input coins) is often available
to the prover (Alice) before the transaction begins. This setup offers an
opportunity to Alice to initiate the proof computation early, even before
the entire witness is available. The remaining computation can then be
delegated to Bob, who can complete it once the final witness (e.g., the
transaction amount) is known.
To prevent Bob from generating proofs independently (e.g., initiating
unauthorized transactions), it is essential that the data provided to him
for the second phase of computation does not reveal the witness used
in the first phase. Additionally, the verifier of the zkSNARK should be
unable to determine whether the proof was generated solely by Alice
or through this two-step process. To achieve this efficiently, we require
this two-phase proof generation to only use cryptography in a black-box
manner.
We propose a split prover zkSNARK based on the Groth16 zkSNARKs
[Groth, EUROCRYPT 2016], meeting all these requirements. Our solution is
also asymptotically tight, meaning it achieves the optimal second phase
proof generation time for Groth16. Importantly, our split prover zk-
SNARK preserves the verification algorithm of the original Groth16
zkSNARK, enabling seamless integration into existing deployments of
Groth16.
2023
CRYPTO
Cryptography with Weights: MPC, Encryption and Signatures
Abstract
The security of many powerful cryptographic systems such as secure multiparty computation, threshold encryption, and threshold signatures rests on trust assumptions about the parties. The de-facto model treats all parties equally and requires that a certain fraction of the parties are honest. While this paradigm of one-person-one-vote has been very successful over the years, current and emerging practical use cases suggest that it is outdated.
In this work, we consider {\em weighted} cryptosystems where every party is assigned a certain weight and the trust assumption is that a certain fraction of the total weight is honest. This setting can be translated to the standard setting (where each party has a unit weight) via virtualization. However, this method is quite expensive, incurring a multiplicative overhead in the weight.
We present new weighted cryptosystems with significantly better efficiency: our proposed schemes incur only an {\em additive} overhead in weights.
\begin{itemize}
\item We first present a weighted ramp secret-sharing scheme (WRSS) where the size of a secret share is $O(w)$ (where $w$ corresponds to the weight). In comparison, Shamir's secret sharing with virtualization requires secret shares of size $w\cdot\lambda$, where $\lambda=\log |\bbF|$ is the security parameter.
\item Next, we use our WRSS to construct weighted versions of (semi-honest) secure multiparty computation (MPC), threshold encryption, and threshold signatures. All these schemes inherit the efficiency of our WRSS and incur only an additive overhead in weights.
\end{itemize}
Our WRSS is based on the Chinese remainder theorem-based secret-sharing scheme. Interestingly, this secret-sharing scheme is {\em non-linear} and only achieves statistical privacy. These distinct features introduce several technical hurdles in applications to MPC and threshold cryptosystems. We resolve these challenges by developing several new ideas.
Coauthors
- Sanjam Garg (2)
- Aarushi Goel (1)
- Abhishek Jain (1)
- Dimitris Kolonelos (1)
- Pratyay Mukherjee (1)
- Sina Shiehian (1)
- Rohit Sinha (2)
- Mingyuan Wang (1)
- Yinuo Zhang (1)